General

  • Target

    2092-2-0x0000000000190000-0x00000000001CE000-memory.dmp

  • Size

    248KB

  • MD5

    f1783fe3313cab8865cae03951457581

  • SHA1

    3ce96500fe1ef5dff2dc03af4aee90e42bb2adb1

  • SHA256

    7650c8b89563a2e8d2fe73db35363c831936bc16769ae9a1ed18bbdebbdd8cfc

  • SHA512

    5fd659554a774cd674e679554c9f720d98d7abd4cb0d01b2b7a22fd9d96f7d0b8463dc92c69e146e51296ae1ce19990e68db42289231ec283c4ed1f0519b96f4

  • SSDEEP

    3072:bEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadD:bGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-2-0x0000000000190000-0x00000000001CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections